{"id":"https://openalex.org/W3161094975","doi":"https://doi.org/10.1109/icce50685.2021.9427665","title":"Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing","display_name":"Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing","publication_year":2021,"publication_date":"2021-01-10","ids":{"openalex":"https://openalex.org/W3161094975","doi":"https://doi.org/10.1109/icce50685.2021.9427665","mag":"3161094975"},"language":"en","primary_location":{"id":"doi:10.1109/icce50685.2021.9427665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce50685.2021.9427665","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052207697","display_name":"Anupama Mishra","orcid":"https://orcid.org/0000-0003-4122-4142"},"institutions":[{"id":"https://openalex.org/I2802000655","display_name":"Swami Rama Himalayan University","ror":"https://ror.org/02nw97x94","country_code":"IN","type":"education","lineage":["https://openalex.org/I2802000655"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anupama Mishra","raw_affiliation_strings":["Swami Rama Himalayan University, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Swami Rama Himalayan University, Uttarakhand, India","institution_ids":["https://openalex.org/I2802000655"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071261948","display_name":"Brij B. Gupta","orcid":"https://orcid.org/0000-0003-4929-4698"},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]},{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN","TW"],"is_corresponding":false,"raw_author_name":"B. B. Gupta","raw_affiliation_strings":["Asia University, Taiwan","National Institute of Technology, Kurukshetra, Haryana, India"],"affiliations":[{"raw_affiliation_string":"Asia University, Taiwan","institution_ids":["https://openalex.org/I143578492"]},{"raw_affiliation_string":"National Institute of Technology, Kurukshetra, Haryana, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022899605","display_name":"Dragan Perakovi\u0107","orcid":"https://orcid.org/0000-0002-0476-9373"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Dragan Perakovic","raw_affiliation_strings":["University of Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"University of Zagreb, Croatia","institution_ids":["https://openalex.org/I181343428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050368394","display_name":"Francisco Jos\u00e9 Garc\u00eda\u2010Pe\u00f1alvo","orcid":"https://orcid.org/0000-0001-9987-5584"},"institutions":[{"id":"https://openalex.org/I184999862","display_name":"Universidad de Salamanca","ror":"https://ror.org/02f40zc51","country_code":"ES","type":"education","lineage":["https://openalex.org/I184999862"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Francisco Jose Garcia Penalvo","raw_affiliation_strings":["University of Salamanca, Spain"],"affiliations":[{"raw_affiliation_string":"University of Salamanca, Spain","institution_ids":["https://openalex.org/I184999862"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091598011","display_name":"Ching\u2010Hsien Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Hsien Hsu","raw_affiliation_strings":["Asia University & National Chung Cheng University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Asia University & National Chung Cheng University, Taiwan","institution_ids":["https://openalex.org/I148099254"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5052207697"],"corresponding_institution_ids":["https://openalex.org/I2802000655"],"apc_list":null,"apc_paid":null,"fwci":6.2148,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.96565617,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9433683156967163},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8179956674575806},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7943940162658691},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6494655013084412},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5798839330673218},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.49761179089546204},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4880150854587555},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.48132145404815674},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45927056670188904},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38803383708000183},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3798958659172058},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36371663212776184},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32342979311943054},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2740192413330078},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2460786998271942},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.13704383373260498}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9433683156967163},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8179956674575806},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7943940162658691},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6494655013084412},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5798839330673218},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.49761179089546204},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4880150854587555},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.48132145404815674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45927056670188904},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38803383708000183},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3798958659172058},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36371663212776184},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32342979311943054},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2740192413330078},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2460786998271942},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.13704383373260498}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce50685.2021.9427665","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce50685.2021.9427665","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2512091525","https://openalex.org/W2792454374","https://openalex.org/W2797742547","https://openalex.org/W2800773710","https://openalex.org/W2801332928","https://openalex.org/W2883939061","https://openalex.org/W2904646604","https://openalex.org/W2908453820","https://openalex.org/W2946414622","https://openalex.org/W2964063558","https://openalex.org/W2969359174","https://openalex.org/W2970145645","https://openalex.org/W2979590797","https://openalex.org/W3007727958","https://openalex.org/W3105750153","https://openalex.org/W3112778273"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Distributed":[0],"Denial":[1],"of":[2,34,66,100,109,133],"service":[3],"attack(DDoS)is":[4],"a":[5,92,127],"network":[6,48],"security":[7],"attack":[8,102,129],"and":[9,23,120],"now":[10],"the":[11,32,37,46,52,58,64,77,83,107,123,131],"attackers":[12,78],"intruded":[13],"into":[14],"almost":[15],"every":[16],"technology":[17],"such":[18],"as":[19,76],"cloud":[20,104],"computing,":[21],"IoT,":[22],"edge":[24],"computing":[25],"to":[26,56],"make":[27],"themselves":[28,80],"stronger.":[29],"As":[30],"per":[31],"behaviour":[33],"DDoS,":[35],"all":[36],"available":[38,85],"resources":[39],"like":[40],"memory,":[41],"cpu":[42],"or":[43,61],"may":[44],"be":[45],"entire":[47],"are":[49,69,73],"consumed":[50],"by":[51,82],"attacker":[53],"in":[54,103],"order":[55],"shutdown":[57],"victim`s":[59],"machine":[60,95,112],"server.":[62],"Though,":[63],"plenty":[65],"defensive":[67],"mechanism":[68,124],"proposed,":[70],"but":[71],"they":[72],"not":[74],"efficient":[75],"get":[79],"trained":[81],"newly":[84],"automated":[86],"attacking":[87],"tools.":[88],"Therefore,":[89],"we":[90],"proposed":[91],"classification":[93,111],"based":[94],"learning":[96,113],"approach":[97],"for":[98],"detection":[99],"DDoS":[101,128],"computing.":[105],"With":[106],"help":[108],"three":[110],"algorithms":[114],"K":[115],"Nearest":[116],"Neighbor,":[117],"Random":[118],"Forest":[119],"Naive":[121],"Bayes,":[122],"can":[125],"detect":[126],"with":[130],"accuracy":[132],"99.76%.":[134]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":11}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
